Skip to content

Commit 6c84650

Browse files
authored
Merge pull request #226893 from inward-eye/main
renamed from how-to to conceptual
2 parents 1ee1fac + 2392ff7 commit 6c84650

File tree

4 files changed

+38
-6
lines changed

4 files changed

+38
-6
lines changed

articles/purview/.openpublishing.redirection.purview.json

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -75,6 +75,11 @@
7575
"redirect_url": "/azure/purview/concept-policies-data-owner",
7676
"redirect_document_id": true
7777
},
78+
{
79+
"source_path_from_root": "/articles/purview/how-to-policies-purview-account-delete.md",
80+
"redirect_url": "/azure/purview/concept-policies-purview-account-delete",
81+
"redirect_document_id": true
82+
},
7883
{
7984
"source_path_from_root": "/articles/purview/concept-account-upgrade.md",
8085
"redirect_url": "/azure/purview/catalog-permissions",
Lines changed: 25 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,25 @@
1+
---
2+
title: Role definitions SQL Performance Monitor and SQL Security Auditor supported only from DevOps policies experience
3+
description: This guide discusses actions that have been retired from Data owner policies experience and are now supported only from the DevOps policies experience.
4+
author: inward-eye
5+
ms.author: vlrodrig
6+
ms.service: purview
7+
ms.subservice: purview-data-policies
8+
ms.topic: conceptual
9+
ms.date: 02/09/2023
10+
ms.custom:
11+
---
12+
# Role definitions SQL Performance Monitor and SQL Security Auditor supported only from DevOps policies experience
13+
14+
This guide discusses actions that have been retired from Data owner policies experience and are now supported only from the DevOps policies experience.
15+
16+
## Important considerations
17+
The following two actions that were previously available in the Microsoft Purview Data owner policies experience are now supported only from the Microsoft Purview DevOps policies, which is a more focused experience.
18+
- SQL Performance Monitor
19+
- SQL Security Auditor
20+
21+
If you currently have Data owner policies with these actions we encourage you to give the DevOps policies experience a try. Creating new policies or editing existing policies that involve these two actions is now unsupported from the Data owner experience.
22+
23+
## Next steps
24+
Check these concept guides
25+
* [DevOps policies](concept-policies-devops.md)

articles/purview/how-to-policies-purview-account-delete.md renamed to articles/purview/concept-policies-purview-account-delete.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,18 +6,18 @@ ms.author: vlrodrig
66
ms.service: purview
77
ms.subservice: purview-data-policies
88
ms.topic: conceptual
9-
ms.date: 11/16/2022
9+
ms.date: 02/09/2023
1010
ms.custom:
1111
---
1212
# Impact of deleting Microsoft Purview account on access policies
1313

1414
## Important considerations
15-
Deleting a Microsoft Purview account that has active (that is, published) policies will remove those policies. This means that the access to data sources or datasets that was previously provisioned via those policies will also be removed. This can lead to outages, that is, users or groups in your organization not able to access critical data. Review the decision to delete the Microsoft Purview account with the people in Policy Author role at root collection level before proceeding. To find out who holds that role in the Microsoft Purview account, review the section on managing role assignments in this [guide](./how-to-create-and-manage-collections.md#add-roles-and-restrict-access-through-collections).
15+
Deleting a Microsoft Purview account that has active (that is, published) policies removes those policies. Any access to a data source or a dataset that was previously provisioned from Microsoft Purview gets revoked. This can lead to outages, that is, users or groups in your organization not able to access critical data. Review the decision to delete the Microsoft Purview account with the people in Policy Author role at root collection level before proceeding. To find out who holds that role in the Microsoft Purview account, review the section on managing role assignments in this [guide](./how-to-create-and-manage-collections.md#add-roles-and-restrict-access-through-collections).
1616

1717
Before deleting the Microsoft Purview account, it's advisable that you provision access to the users in your organization that need access to datasets using an alternate mechanism or a different Purview account. Then orderly delete or unpublish any active policies
18-
* [Deleting DevOps policies](how-to-policies-devops-authoring-generic.md#delete-a-devops-policy) - You'll need to delete DevOps policies for them to be unpublished.
18+
* [Deleting DevOps policies](how-to-policies-devops-authoring-generic.md#delete-a-devops-policy) - You need to delete DevOps policies for them to be unpublished.
1919
* [Unpublishing Data Owner policies](how-to-policies-data-owner-authoring-generic.md#unpublish-a-policy).
20-
* [Deleting Self-service access policies](how-to-delete-self-service-data-access-policy.md) - You'll need to delete Self-service access policies for them to be unpublished.
20+
* [Deleting Self-service access policies](how-to-delete-self-service-data-access-policy.md) - You need to delete Self-service access policies for them to be unpublished.
2121

2222
## Next steps
2323
Check these concept guides

articles/purview/toc.yml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,10 @@ items:
134134
href: concept-policies-devops.md
135135
- name: Self-service data access policy
136136
href: concept-self-service-data-access-policy.md
137+
- name: Impact of deleting Microsoft Purview account on access policies
138+
href: concept-policies-purview-account-delete.md
139+
- name: Update on Data owner policies actions
140+
href: concept-policies-data-owner-action-update.md
137141
- name: Data Estate Insights
138142
items:
139143
- name: Data Estate Insights
@@ -369,8 +373,6 @@ items:
369373
items:
370374
- name: Register data sources for "Data use management"
371375
href: how-to-enable-data-use-management.md
372-
- name: Impact of deleting Microsoft Purview account on access policies
373-
href: how-to-policies-purview-account-delete.md
374376
- name: DevOps policies
375377
items:
376378
- name: DevOps policies - Create, list, update and delete policies

0 commit comments

Comments
 (0)